Security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system. [NIST Special Pub 800-53]

A SNIA working group in which specific technical work is undertaken, protected by the SNIA IP Policy.

Within the SNIA, technical work for standards development is conducted by volunteer technologists from member companies. The TWGs report to the SNIA Technical Council, which in turn reports to the SNIA Board.

The SNIA uses the base 10 convention commonly found in I/O-related and scientific literature rather than the base 2 convention (1,099,511,627,776, i.e., 240) common in computer system and software literature.

The SNIA uses the base 10 convention commonly found in I/O-related and scientific literature rather than the base 2 convention (1,099,5111,627,776, i.e., 240) common in computer system and software literature.

1. A network in which each node's transmitter is connected to the receiver of the node to its logical right, forming a continuous ring.

Nodes on a token ring network gain the right to transmit data by retaining a token (a specific unique message) when they receive it. When a node holding the token has transmitted its allotment of data, it forwards the token to the next node in the ring.

2. A LANprotocol for token ring networks governed by IEEE Standard 802.3 that operates at speeds of 4 Mbits/second and 16 Mbits/second.

1. The logical layout of the components of a computer system or network and their interconnections.

Topology deals with questions of what components are directly connected to other components from the standpoint of being able to communicate. It does not deal with questions of physical location of components or interconnecting cables.

2. The communication infrastructure that provides Fibre Channel communication among a set of PN-Ports (e.g., a Fabric, an Arbitrated Loop, or a combination of the two).

A type of migration in which a format or representation change occurs during the movement of data or information.

Transformation involves possible information loss, since newer formats may be incapable of capturing all the functionality of the original format, or the migration system may be unable to interpret all the nuances of the original format.

1. The portion of a Link_Control_Facility that converts valid data bytes and special codes into transmission characters using the rules specified by the transmission code, converting these transmission characters into a bit stream, and transmitting this bit stream on an optical or electrical transmission medium.

2. An electronic circuit that converts an electrical logic signal to a signal suitable for an optical or electrical communications media.

A protocol suite defined by the IETF that provides privacy and data integrity between two communicating applications, using higher-level protocols that can layer on top of the TLS protocol transparently.

There are multiple versions of TLS, which are not compatible with each other, and early versions are considered less secure and should not be used. Multiple SNIA specifications leverage TLS as an important security mechanism; to ensure both security and interoperability, SNIA has published the SNIA TLS specification for storage systems (also ISO/IEC 20648) to identify specific requirements and guidance for TLS when it is used in conjunction with these SNIA specifications.

A not-for-profit organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices.

A system that may be used for processing of sensitive or classified information, that employs sufficient hardware and software integrity measures to assure that it performs according to its documented specification and acts in a predictable manner.

Such a system is developed in accordance with security criteria and evaluated by these criteria.

A technology that enables one network protocol to send its data via another network protocol's connections.

Tunneling works by encapsulating the first network protocol within packets carried by the second protocol. A tunnel may also encapsulate a protocol within itself (e.g., an IPsec gateway operates in this fashion, encapsulating IP in IP and inserting additional IPsec information between the two IP headers).